Searched refs:p_ucred (Results 1 - 16 of 16) sorted by relevance

/xnu-2782.1.97/bsd/sys/
H A Dproc_internal.h189 p->p_uid = kauth_cred_getuid(p->p_ucred); \
190 p->p_gid = kauth_cred_getgid(p->p_ucred); \
191 p->p_ruid = kauth_cred_getruid(p->p_ucred); \
192 p->p_rgid = kauth_cred_getrgid(p->p_ucred); \
193 p->p_svuid = kauth_cred_getsvuid(p->p_ucred); \
194 p->p_svgid = kauth_cred_getsvgid(p->p_ucred); \
242 kauth_cred_t p_ucred; /* Process owner's identity. (PL) */ member in struct:proc
/xnu-2782.1.97/bsd/kern/
H A Dkern_prot.c787 * reference. If p_ucred has changed then we should
790 if (p->p_ucred != my_cred) {
797 p->p_ucred = my_new_cred;
877 * reference. If p_ucred has changed then we
880 if (p->p_ucred != my_cred) {
887 p->p_ucred = my_new_cred;
1024 * reference. If p_ucred has changed then we should
1027 if (p->p_ucred != my_cred) {
1034 p->p_ucred = my_new_cred;
1128 * reference. If p_ucred ha
[all...]
H A Dbsd_init.c580 kernproc->p_ucred = kauth_cred_create(&temp_cred);
587 kauth_cred_ref(kernproc->p_ucred);
588 ut->uu_context.vc_ucred = kernproc->p_ucred;
600 mac_cred_label_associate_kernel(kernproc->p_ucred);
910 context.vc_ucred = kernproc->p_ucred;
1019 mac_cred_label_associate_user(p->p_ucred);
H A Dkern_fork.c461 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc);
581 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc);
1084 kauth_cred_unref(&p->p_ucred);
1245 child_proc->p_ucred = kauth_cred_get_with_ref();
H A Dkern_exit.c928 * p_ucred usage is safe as it is an exiting process
931 pp->si_uid = kauth_cred_getruid(p->p_ucred);
1051 * proc internal fileds and p_ucred usage safe
1059 trace_parent->si_uid = kauth_cred_getruid(child->p_ucred);
1125 * p_ucred usage is safe here as it is an exited process.
1129 (void)chgproccnt(kauth_cred_getruid(child->p_ucred), -1);
1140 if (IS_VALID_CRED(child->p_ucred)) {
1141 kauth_cred_unref(&child->p_ucred);
1144 /* XXXX Note NOT SAFE TO USE p_ucred from this point onwards */
2135 * p_ucred usag
[all...]
H A Dkern_exec.c2139 context.vc_ucred = p->p_ucred; /* XXX must NOT be kauth_cred_get() */
2225 * The use of p_ucred is safe, since we are acting on the
2230 kauth_cred_t my_cred = p->p_ucred;
2233 p->p_ucred = my_new_cred;
3692 p->p_ucred = kauth_cred_setresuid(p->p_ucred, KAUTH_UID_NONE, imgp->ip_origvattr->va_uid, imgp->ip_origvattr->va_uid, KAUTH_UID_NONE);
3697 p->p_ucred = kauth_cred_setresgid(p->p_ucred, KAUTH_GID_NONE, imgp->ip_origvattr->va_gid, imgp->ip_origvattr->va_gid);
3858 p->p_ucred = kauth_cred_setsvuidgid(p->p_ucred, kauth_cred_getui
[all...]
H A Dkern_sysctl.c629 if (p->p_ucred == NULL)
648 if (p->p_ucred == NULL)
917 if (p->p_ucred) {
977 if (p->p_ucred) {
H A Dkern_credential.c3507 if (uthread->uu_ucred != proc->p_ucred &&
3584 * after the refeence is taken to protect the p_ucred field of
4445 * reference. If p_ucred has changed then we should
4448 if (p->p_ucred != my_cred) {
4455 p->p_ucred = my_new_cred;
4525 * reference. If p_ucred has changed then we should
4528 if (p->p_ucred != my_cred) {
4535 p->p_ucred = my_new_cred;
4618 * credential being referenced is from p_ucred, the vnode lock
H A Dproc_info.c313 if (p->p_ucred == NULL)
327 if (p->p_ucred == NULL)
H A Dkern_proc.c874 return(p->p_ucred);
/xnu-2782.1.97/bsd/dev/dtrace/scripts/
H A Ddarwin.d205 pr_uid = P->p_ucred->cr_posix.cr_ruid;
206 pr_euid = P->p_ucred->cr_posix.cr_uid;
207 pr_gid = P->p_ucred->cr_posix.cr_rgid;
208 pr_egid = P->p_ucred->cr_posix.cr_groups[0];
/xnu-2782.1.97/bsd/security/audit/
H A Daudit_session.c435 kauth_cred_t cred = p->p_ucred;
1012 kauth_cred_t cred = p->p_ucred;
1030 kauth_cred_t cred = p->p_ucred;
1171 * If p_ucred has changed then we should restart this
1174 if (p->p_ucred != my_cred) {
1182 p->p_ucred = my_new_cred;
1394 kauth_cred_ref(p->p_ucred);
1395 my_cred = p->p_ucred;
1418 p->p_ucred = my_new_cred;
/xnu-2782.1.97/bsd/dev/dtrace/
H A Dfasttrap.c1459 crhold(p->p_ucred);
1460 cred = p->p_ucred;
/xnu-2782.1.97/tools/lldbmacros/
H A Dprocess.py52 ucred = proc.p_ucred
/xnu-2782.1.97/bsd/vfs/
H A Dkpi_vfs.c1263 kerncontext.vc_ucred = kernproc->p_ucred;
/xnu-2782.1.97/bsd/net/
H A Dpf_ioctl.c1375 dst->cuid = kauth_cred_getuid(p->p_ucred);

Completed in 114 milliseconds